Send Emails with Mandrill Security & Risk Analysis

wordpress.org/plugins/send-emails-with-mandrill

'Send Emails with Mandrill' sends emails that are generated by WordPress through Mandrill, a transactional email service powered by MailChimp.

7K active installs v1.6.2 PHP 8.1+ WP 3.0+ Updated Feb 17, 2026
emailmailchimpmandrillsmtpwp_mail
99
A · Safe
CVEs total1
Unpatched0
Last CVEAug 9, 2024
Download
Safety Verdict

Is Send Emails with Mandrill Safe to Use in 2026?

Generally Safe

Score 99/100

Send Emails with Mandrill has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Aug 9, 2024Updated 1mo ago
Risk Assessment

The static analysis of the "send-emails-with-mandrill" plugin version 1.6.2 reveals a generally good security posture, with no identified attack surface points, dangerous functions, or unsanitized taint flows. The code demonstrates strong practices by using prepared statements for all SQL queries and properly escaping a high percentage of its outputs. The presence of capability checks further enhances security by ensuring appropriate user permissions are verified.

However, a previous vulnerability history of one known CVE, though currently patched, warrants attention. While the recent vulnerability was listed as medium severity and is now patched, it highlights a past weakness that could indicate a tendency for certain types of security flaws, specifically missing authorization. The absence of nonce checks is also a minor concern, especially if any future AJAX or REST API endpoints are introduced without proper authorization.

Overall, the plugin appears to be well-developed from a security perspective, with its strengths lying in its minimal attack surface and secure coding practices for SQL and output handling. The past vulnerability, however, suggests a need for continued vigilance and thorough auditing of any new features to prevent similar issues from arising.

Key Concerns

  • Previous medium severity CVE
  • No nonce checks implemented
Vulnerabilities
1

Send Emails with Mandrill Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-43208medium · 4.3Missing Authorization

Send Emails with Mandrill <= 1.4.1 - Missing Authorization

Aug 9, 2024 Patched in 1.4.2 (28d)
Code Analysis
Analyzed Mar 16, 2026

Send Emails with Mandrill Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
46 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

85% escaped54 total outputs
Attack Surface

Send Emails with Mandrill Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Send Emails with Mandrill Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 17, 2026
PHP min version8.1
Downloads251K

Community Trust

Rating100/100
Number of ratings11
Active installs7K
Developer Profile

Send Emails with Mandrill Developer Profile

Matt Miller

7 plugins · 11K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
28 days
View full developer profile
Detection Fingerprints

How We Detect Send Emails with Mandrill

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/send-emails-with-mandrill/assets/css/wpmandrill-admin-style.css/wp-content/plugins/send-emails-with-mandrill/assets/js/wpmandrill-admin-script.js
Script Paths
/wp-content/plugins/send-emails-with-mandrill/assets/js/wpmandrill-admin-script.js
Version Parameters
send-emails-with-mandrill/assets/css/wpmandrill-admin-style.css?ver=send-emails-with-mandrill/assets/js/wpmandrill-admin-script.js?ver=

HTML / DOM Fingerprints

JS Globals
SEWM_VERSIONSEWM_BASESEWM_URLSEWM_PATH
FAQ

Frequently Asked Questions about Send Emails with Mandrill